2019 14th Asia Joint Conference on Information Security (AsiaJCIS) 2019
DOI: 10.1109/asiajcis.2019.00006
|View full text |Cite
|
Sign up to set email alerts
|

Designing Authentication and Authorization System with Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…In this study, it is ensured that identity authentication is performed more securely using blockchainbased PKI structure and smart contracts through a verification and authorization server [2]. In this study, the web user needs to enter information such as public key certificate, random number and signature on the login screen, which can be considered extremely inappropriate for data security and ease of use.…”
Section: Blockchain Based Identity Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this study, it is ensured that identity authentication is performed more securely using blockchainbased PKI structure and smart contracts through a verification and authorization server [2]. In this study, the web user needs to enter information such as public key certificate, random number and signature on the login screen, which can be considered extremely inappropriate for data security and ease of use.…”
Section: Blockchain Based Identity Authenticationmentioning
confidence: 99%
“…If an identity authentication mechanism can be implemented to be used by different applications together rather than being used by each application separately, each application does not need to manage own authentication task. This provides great convenience for both applications and users [2].…”
Section: Introductionmentioning
confidence: 99%
“…Secure data sharing can be among multiple organizations by registered data from the IoT devices on the same [4], [5]. In these systems, the authentication algorithm, the verification algorithm, and the authentication information performed on the blockchain are not provided, so a suitable authentication scheme for the purpose of the system can be applied.…”
Section: Introductionmentioning
confidence: 99%